Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Agent Browser
v0.1.0Automates browser interactions for web testing, form filling, screenshots, and data extraction. Use when the user needs to navigate websites, interact with web pages, fill forms, take screenshots, test web applications, or extract information from web pages.
⭐ 4· 4.1k·12 current·14 all-time
byMurphy Liu@murphykobe
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the provided commands, references, and templates (navigation, snapshots, interactions, screenshots, session persistence, proxy support, recording). Proxy rotation, session saving, and scraping examples are within scope for a browser automation tool.
Instruction Scope
Runtime instructions and templates instruct reading/writing session state files, using environment variables for credentials, setting proxies, uploading local files, and optionally using "--ignore-https-errors". These actions are expected for this kind of skill but can expose sensitive data (auth-state files, credentials, local files). There are no instructions that explicitly exfiltrate data to unexpected remote endpoints.
Install Mechanism
No install spec (instruction-only) — lowest install risk. The package includes shell templates but does not download or extract external code during install.
Credentials
Skill declares no required env vars or credentials (primaryEnv none). Templates recommend using env vars for credentials and proxy URLs (optional). This is proportionate, but saved state files and embedded proxy credential examples can contain secrets and should be protected.
Persistence & Privilege
always:false and no system-wide configuration changes are requested. The skill suggests saving and loading session state files (local files) which is normal for automation; autonomous invocation is allowed by default but is not combined with other red flags.
Assessment
This package appears to be a straightforward browser-automation helper. Before installing or using it, consider the following: (1) The skill assumes a separate 'agent-browser' binary — verify that binary's source and trustworthiness before running templates that call it. (2) Saved session state files (auth-state.json, etc.) contain cookies and tokens — treat them as secrets: do not commit them to version control and delete them when no longer needed. (3) Proxy rotation and authenticated proxies can be used for legitimate geo-testing but may violate target sites' terms of service or law when used for aggressive scraping; review legal/ethical constraints. (4) Templates show embedding credentials in environment variables or proxy URLs — avoid hardcoding secrets in scripts or logs. (5) The tool can upload local files and connect to CDP ports; avoid running scripts that point to sensitive local paths or connect to exposed remote debugging ports. (6) Using options like --ignore-https-errors or proxies that perform TLS inspection can expose you to MITM risks; use cautiously. Review and sanitize the included templates before running them in production.Like a lobster shell, security has layers — review code before you run it.
latestvk9706phwyfr1aprsxj8zbn964h7zzk4c
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
